<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Logging — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/logging/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 01 Jan 2024 00:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/logging/feed.xml" rel="self" type="application/rss+xml"/><item><title>Detection of IIS HTTP Logging Disabled via AppCmd.exe</title><link>https://feed.craftedsignal.io/briefs/2024-01-disable-iis-logging/</link><pubDate>Mon, 01 Jan 2024 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-disable-iis-logging/</guid><description>This analytic detects the use of AppCmd.exe to disable HTTP logging on IIS servers, allowing adversaries to evade detection by removing evidence of their actions.</description><content:encoded><![CDATA[<p>This detection identifies the use of <code>AppCmd.exe</code> to disable HTTP logging on Internet Information Services (IIS) servers. The technique is significant as adversaries can use it to erase traces of their malicious activities. The detection focuses on process execution events logged by Endpoint Detection and Response (EDR) agents. By disabling HTTP logging, attackers can operate undetected, making it difficult to trace their actions and respond effectively to intrusions. The references indicate this technique has been observed in campaigns attributed to threat actors like OilRig, where IIS backdoors are used.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access to the system via exploitation of a vulnerability or compromised credentials.</li>
<li>Attacker gains a foothold on the IIS server.</li>
<li>The attacker executes <code>appcmd.exe</code> to modify IIS settings.</li>
<li><code>appcmd.exe</code> is executed with parameters to disable HTTP logging, such as <code>httplogging</code> or <code>dontlog:true</code>.</li>
<li>The command modifies the IIS configuration, preventing HTTP request logs from being recorded.</li>
<li>The attacker performs malicious actions on the compromised server (e.g., web shell deployment, data theft).</li>
<li>With HTTP logging disabled, the attacker&rsquo;s activities are not recorded in standard IIS logs, hindering forensic analysis.</li>
<li>The attacker maintains persistence and continues to exploit the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of this attack can lead to a significant reduction in visibility into attacker activities on IIS servers. The lack of HTTP logs hinders incident response efforts, making it difficult to identify the scope and nature of the compromise. This could lead to prolonged attacker presence, further data exfiltration, or deployment of malicious software. This technique is a common step to evade defenses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect IIS HTTP Logging Disabled via AppCmd.exe</code> to your SIEM and tune for your environment.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to capture command-line arguments of <code>appcmd.exe</code>.</li>
<li>Monitor process execution events for <code>appcmd.exe</code> with command-line arguments related to <code>httplogging</code> or <code>dontlog:true</code>.</li>
<li>Investigate any instances of <code>appcmd.exe</code> being executed by non-administrator accounts or unusual parent processes.</li>
<li>Review IIS configuration regularly for any unauthorized changes to HTTP logging settings.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>iis</category><category>logging</category><category>defense-evasion</category><category>windows</category></item></channel></rss>